Ireland could be in for a crisp shortage after popular snack company KP’s security was breached in a cyber attack.
Customers may notice major brands missing from supermarket shelves until next month.
The products affected include McCoy's, Hula Hoops, Tyrell’s, Space Raiders, Skips, Butterkist, Pom-Bears, Nik-Naks, and KP nuts.
According to Better Retailing, the cyberattack has led to the cancellation of numerous deliveries that could last until the end of March ‘at the earliest’.
A letter from KP Snacks sent to store owners on February 2 said its systems had been ‘compromised by ransomware’ and it “cannot safely process orders or dispatch goods.”
KP Snacks revealed hackers wiped out its IT and communications systems beginning on January 28.
The letter read: “We have teams working through the resolution, but it is unknown when this will be resolved.”
Messages sent by Nisa to partnered stores on February 1 and seen by Better Retailing told local shops to ‘expect supply issues on base stock and promotions until further notice.’
Wholesalers Nisa said: “Initial discussions have highlighted that no orders will be being placed or delivered for a couple of weeks at least, and service could be effected until the end of March at the earliest.”
Nisa said it was introducing ordering caps in order to ‘manage what stock we do have’.
Files seen by cyber security site Bleeping Computer showed KP Snacks listed on hacker group Conti’s confidential ‘data leak page’.
Bleeping Computer said KP Snacks related “credit card statements, birth certificates, spreadsheets with employee addresses and phone numbers, confidential agreements, and other sensitive documents” were shown on the data leak page.
Asked about the incident, a KP Snacks spokesperson responded: “On Friday, January 28 we became aware that we were unfortunately victims of a ransomware incident.
“As soon as we became aware of the incident, we enacted our cybersecurity response plan and engaged a leading forensic information technology firm and legal counsel to assist us in our investigation.
“Our internal IT teams continue to work with third-party experts to assess the situation. We have been continuing to keep our colleagues, customers, and suppliers informed of any developments and apologise for any disruption this may have caused.”